CVE-2020-0559

Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_7265_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:53

Type Values Removed Values Added
References () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html - Patch, Vendor Advisory () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html - Patch, Vendor Advisory
References () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html - Vendor Advisory () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html - Vendor Advisory

Information

Published : 2020-08-13 04:15

Updated : 2024-11-21 04:53


NVD link : CVE-2020-0559

Mitre link : CVE-2020-0559

CVE.ORG link : CVE-2020-0559


JSON object : View

Products Affected

intel

  • celeron_j4125
  • atom_x7-e3950
  • celeron_n4500
  • pentium_n3530
  • ac_9461_firmware
  • celeron_n2808
  • ac_7265_firmware
  • celeron_n2810
  • celeron_n3350
  • atom_x5-e3930
  • ac_8260_firmware
  • pentium_j4205
  • pentium_j2900
  • ac_9260_firmware
  • ac_3165_firmware
  • celeron_n2830
  • celeron_n4120
  • celeron_n6210
  • pentium_n3710
  • ax201_firmware
  • celeron_n2807
  • celeron_j3160
  • celeron_j6412
  • celeron_j4105
  • celeron_j1750
  • pentium_n4200
  • atom_x5-e3940
  • pentium_j3710
  • celeron_j3355
  • celeron_n3450
  • celeron_n2806
  • celeron_j3355e
  • celeron_n5100
  • celeron_n4000
  • celeron_n3150
  • celeron_n3060
  • celeron_j1900
  • celeron_j3455
  • celeron_n2805
  • ax200_firmware
  • celeron_n4505
  • ac_9462_firmware
  • celeron_n2840
  • celeron_n2920
  • celeron_n2820
  • celeron_n3000
  • celeron_j3455e
  • celeron_n5105
  • celeron_n2815
  • pentium_n6415
  • celeron_j1800
  • pentium_n3540
  • celeron_n2910
  • celeron_n3160
  • pentium_n3510
  • celeron_j1850
  • celeron_n2930
  • ac_9560_firmware
  • pentium_j6426
  • ac_8265_firmware
  • celeron_j4025
  • celeron_n6211
  • celeron_j4005
  • celeron_n3010
  • celeron_n4100
  • pentium_j2850
  • celeron_n2940
  • pentium_n3700
  • pentium_n4200e
  • celeron_n3050
  • ac_3168_firmware
  • pentium_n3520
  • celeron_j6413
  • celeron_n3350e
  • celeron_j3060
  • celeron_n4020

microsoft

  • windows_8.1
  • windows_7
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource